CAPEC-545: Pull Data from System Resources

ID CAPEC-545
Status Draft

An adversary who is authorized or has the ability to search known system resources, does so with the intention of gathering useful information. System resources include files, memory, and other aspects of the target system. In this pattern of attack, the adversary does not necessarily know what they are going to find when they start pulling data. This is different than CAPEC-150 where the adversary knows what they are looking for due to the common location.

https://capec.mitre.org/data/definitions/545.html

Weaknesses

# ID Name Type
CWE-1239 Improper Zeroization of Hardware Register weakness
CWE-1243 Sensitive Non-Volatile Information Not Protected During Debug weakness
CWE-1258 Exposure of Sensitive System Information Due to Uncleared Debug Information weakness
CWE-1258 Exposure of Sensitive System Information Due to Uncleared Debug Information weakness
CWE-1266 Improper Scrubbing of Sensitive Data from Decommissioned Device weakness
CWE-1272 Sensitive Information Uncleared Before Debug/Power State Transition weakness
CWE-1278 Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques weakness
CWE-1323 Improper Management of Sensitive Trace Data weakness
CWE-1330 Remanent Data Readable after Memory Erase weakness

Taxonomiy Mapping

Type # ID Name
ATTACK 1005 Data from Local System
ATTACK 1555.001 Credentials from Password Stores:Keychain
Loading...